WPC Add Product to Order for WooCommerce Security & Risk Analysis

wordpress.org/plugins/wpc-add-product-to-order

Directly add products to existing orders from the frontend product page.

0 active installs v1.0.2 PHP + WP 4.0+ Updated Unknown
add-to-orderadminorderproductwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPC Add Product to Order for WooCommerce Safe to Use in 2026?

Generally Safe

Score 100/100

WPC Add Product to Order for WooCommerce has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wpc-add-product-to-order" plugin version 1.0.2 demonstrates a generally good security posture based on the provided static analysis. A significant strength is the complete absence of unprotected entry points, with all 8 AJAX handlers correctly implementing authentication checks. The plugin also exhibits strong adherence to secure coding practices with 100% of SQL queries utilizing prepared statements and 98% of output properly escaped. The lack of any recorded vulnerabilities in its history further contributes to a positive security impression.

Despite these strengths, there are a few areas that warrant attention. The presence of three instances of the `unserialize()` function is a notable concern. While the current taint analysis shows no unsanitized paths, `unserialize()` is inherently risky as it can lead to remote code execution if fed malicious data, especially when dealing with user-controlled input. The external HTTP requests, while not flagged as problematic in the current analysis, could pose a risk if the target URLs are not trustworthy or if sensitive data is transmitted insecurely.

In conclusion, the plugin is well-defended against common entry point exploits and generally follows secure coding guidelines. However, the use of `unserialize()` introduces a potential attack vector that should be carefully monitored and ideally refactored to a safer serialization method if user input is involved. The plugin's clean vulnerability history is a positive indicator, suggesting a responsible development approach.

Key Concerns

  • Use of unserialize function
Vulnerabilities
None known

WPC Add Product to Order for WooCommerce Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WPC Add Product to Order for WooCommerce Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
2
94 escaped
Nonce Checks
10
Capability Checks
6
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:111
unserialize$plugins = unserialize( $response['body'] );includes\dashboard\wpc-dashboard.php:189
unserialize$plugins = unserialize( $response['body'] );includes\kit\wpc-kit.php:98

Output Escaping

98% escaped96 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
ajax_export (includes\dashboard\wpc-dashboard.php:225)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPC Add Product to Order for WooCommerce Attack Surface

Entry Points8
Unprotected0

AJAX Handlers 8

authwp_ajax_wpcap_search_ordersincludes\class-ajax.php:16
authwp_ajax_wpcap_get_order_summaryincludes\class-ajax.php:17
authwp_ajax_wpcap_add_to_orderincludes\class-ajax.php:18
authwp_ajax_wpc_get_pluginsincludes\dashboard\wpc-dashboard.php:19
authwp_ajax_wpc_get_suggestionincludes\dashboard\wpc-dashboard.php:20
authwp_ajax_wpc_exportincludes\dashboard\wpc-dashboard.php:21
authwp_ajax_wpc_importincludes\dashboard\wpc-dashboard.php:22
authwp_ajax_wpc_get_essential_kitincludes\kit\wpc-kit.php:22
WordPress Hooks 10
actionwpincludes\class-frontend.php:17
actionwp_enqueue_scriptsincludes\class-frontend.php:23
actionwoocommerce_after_add_to_cart_buttonincludes\class-frontend.php:26
actionwp_footerincludes\class-frontend.php:29
actionadmin_enqueue_scriptsincludes\dashboard\wpc-dashboard.php:17
actionadmin_menuincludes\dashboard\wpc-dashboard.php:18
actionbefore_woocommerce_initincludes\hpos.php:7
actionadmin_enqueue_scriptsincludes\kit\wpc-kit.php:20
actionadmin_menuincludes\kit\wpc-kit.php:21
actionplugins_loadedwpc-add-product-to-order.php:48
Maintenance & Trust

WPC Add Product to Order for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version
Downloads133

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WPC Add Product to Order for WooCommerce Developer Profile

WPClever

71 plugins · 441K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
68 days
View full developer profile
Detection Fingerprints

How We Detect WPC Add Product to Order for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-add-product-to-order/assets/css/frontend.css/wp-content/plugins/wpc-add-product-to-order/assets/js/frontend.js
Script Paths
/wp-content/plugins/wpc-add-product-to-order/assets/js/frontend.js
Version Parameters
wpc-add-product-to-order/assets/css/frontend.css?ver=wpc-add-product-to-order/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpcap-btnwpcap-open-modalwpcap-modalwpcap-modal-overlaywpcap-modal-contentwpcap-modal-headerwpcap-modal-closewpcap-modal-body+6 more
Data Attributes
id="wpcap-modal"id="wpcap-search-input"id="wpcap-search-results"id="wpcap-order-summary"id="wpcap-btn-confirm"
JS Globals
wpcap_vars
FAQ

Frequently Asked Questions about WPC Add Product to Order for WooCommerce